According to Gartner, by 2020, the world will be saturated with more than 21 billion connected devices. Other experts say that by the same year, there will be more people with a mobile phone than those with running water and a car, and that Internet traffic will break the zettabyte barrier.

Clearly, the BYOD security debate is over, as organizations recognized long ago that to stay competitive, they need to be flexible enough to allow users the freedom to connect multiple devices, whether they’re owned by IT or not.

To truly mitigate the risk of mobile and IoT-enabled data breaches, organizations need to consider the five steps covered in this report – which comply with HKMA and SFC Cybersecurity Guidelines on Network Access Control.